Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks

Y Yao, J Zhao, Z Li, X Cheng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As a legacy from conventional wireless services, illegal eavesdropping is regarded as one
of the critical security challenges in Connected and Autonomous Vehicles (CAVs) network …

Joint secure offloading and resource allocation for vehicular edge computing network: A multi-agent deep reinforcement learning approach

Y Ju, Y Chen, Z Cao, L Liu, Q Pei… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The mobile edge computing (MEC) technology can simultaneously provide high-speed
computing services for multiple vehicular users (VUs) in vehicular edge computing (VEC) …

UAV-enabled secure communications by multi-agent deep reinforcement learning

Y Zhang, Z Mou, F Gao, J Jiang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can be employed as aerial base stations to support
communication for the ground users (GUs). However, the aerial-to-ground (A2G) channel …

Physical layer security assisted computation offloading in intelligently connected vehicle networks

Y Liu, W Wang, HH Chen, F Lyu, L Wang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we propose a secure computationoffloading scheme (SCOS) in intelligently
connected vehicle (ICV) networks, aiming to minimize overall latency of computing via …

UAV-aided cellular communications with deep reinforcement learning against jamming

X Lu, L Xiao, C Dai, H Dai - IEEE Wireless Communications, 2020 - ieeexplore.ieee.org
Cellular systems have to resist smart jammers that can optimize their selection of jamming
channels and powers based on the estimated ongoing network states. In this article, we …

UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel

A Li, Q Wu, R Zhang - IEEE Wireless Communications Letters, 2018 - ieeexplore.ieee.org
This letter proposes a novel unmanned aerial vehicle (UAV)-enabled mobile jamming
scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is …

Anti-intelligent UAV jamming strategy via deep Q-networks

N Gao, Z Qin, X Jing, Q Ni, S Jin - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The downlink communications are vulnerable to intelligent unmanned aerial vehicle (UAV)
jamming attack. In this paper, we propose a novel anti-intelligent UAV jamming strategy, in …

Secure transmission scheme based on joint radar and communication in mobile vehicular networks

Y Yao, F Shu, Z Li, X Cheng… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security
and privacy since all types of possible breaches are common in connected and autonomous …

Safe exploration in wireless security: A safe reinforcement learning algorithm with hierarchical structure

X Lu, L Xiao, G Niu, X Ji, Q Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most safe reinforcement learning (RL) algorithms depend on the accurate reward that is
rarely available in wireless security applications and suffer from severe performance …

User-centric view of unmanned aerial vehicle transmission against smart attacks

L Xiao, C Xie, M Min, W Zhuang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) systems are vulnerable to smart attackers, who are selfish
and subjective end-users and use smart radio devices to change their attack types and …